Cyber security

Elevation Station: Mastering Privilege Escalation with Advanced Token Manipulation Techniques

ElevationStation is a privilege escalation tool. It works by borrowing from commonly used escalation techniques involving manipulating/duplicating process and thread…

1 year ago

Enhancing macOS Security: A Guide to Red Canary Mac Monitor

Red Canary Mac Monitor is an advanced, stand-alone system monitoring tool tailor-made for macOS security research, malware triage, and system troubleshooting.…

1 year ago

Afuzz – An automated web path fuzzing tool

Finding security holes is a lot like finding hidden treasures in the world of bug bounty hunts. "Afuzz" turns out…

1 year ago

PassBreaker: A Comprehensive Guide to Advanced Password Cracking Techniques

Even though cybersecurity is always changing, cracking passwords is still an important skill for security workers to have. "PassBreaker," a…

1 year ago

NimExec: Fileless Command Execution via MS-SCMR

Basically, NimExec is a fileless remote command execution tool that uses The Service Control Manager Remote Protocol (MS-SCMR). It changes…

1 year ago

NetAtlas C2 Server Search: Detecting Command and Control Servers with Netlas API

C2 Search Netlas is a Java utility designed to detect Command and Control (C2) servers using the Netlas API. It…

1 year ago

Porch Pirate: A Comprehensive Reconnaissance and OSINT Framework for Postman

Porch Pirate started as a tool to quickly uncover Postman secrets, and has slowly begun to evolve into a multi-purpose…

1 year ago

DrawNmap: Revolutionizing Network Analysis with Python-Based Visualization of Nmap Scan Results

Herramienta desarrollada en Python para mostrar en un diagrama de red el contenido de un escaneo Nmap en formato XML.…

1 year ago

All-in-One Bug Hunting Setup: The Ultimate Debian Linux Script for Cybersecurity Enthusiasts

In the always-changing world of cybersecurity, it's important to be quick and careful. For Debian Linux users who are really…

1 year ago

Amnesiac: The Power of PowerShell in Active Directory Post-Exploitation

Amnesiac is a post-exploitation framework designed to assist with lateral movement within active directory environments. Amnesiac is being developed to bridge…

1 year ago